p-Index From 2021 - 2026
10.473
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Sistemasi: Jurnal Sistem Informasi Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) JSI (Jurnal sistem Informasi) Universitas Suryadarma Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi Edumaspul: Jurnal Pendidikan
Claim Missing Document
Check
Articles

Digitalisasi Portofolio Siswa Berbasis Website di SMK Informatika Wonosobo Riadi, Imam; Umar, Rusydi; Muis, Alwas; Yunus, Muhajir
Jurnal Pengabdian Masyarakat Bumi Rafflesia Vol. 6 No. 3 (2023): Desember : Jurnal Pengabdian Kepada Masyarakat Bumi Raflesia
Publisher : Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Siswa dilatih untuk memiliki skill dan pengetahuan agar dapat bekerja pada industri. Setiap siswa dituntut memiliki pengetahuan yang dapat digunakan untuk mencari kerja setelah lulus. Kebutuhan akan adaptasi terhadap perkembangan teknologi informasi dan komunikasi dalam dunia pendidikan semakin meningkat. Sehingga dibutuhkan pelatihan terkait penggunaan teknologi informasi untuk membantu siswa beradaptasi dengan perkembangan teknologi. Tujuan pelatihan ini yaitu untuk memperkenalkan siswa tentang konsep portofolio digital berbasis website dan membekali mereka dengan keterampilan menggunakan teknologi informasi yang relevan untuk membangun dan mengelola portofolio. Manfaat pelatihan ini yaitu membantu siswa untuk mempresentasikan karya-karya mereka secara efektif kepada pihak-pihak yang berkepentingan seperti calon perguruan tinggi dan pemberi kerja. Metode analisis data pada pelatihan ini menggunakan metode likert dengan memberikan pernyataan dan memberikan jawaban mulai dari sangat setuju, setuju, netral, tidak setuju, dan sangat tidak setuju. Siswa berhasil membangun portofolio digital yang menarik dan profesional, memamerkan karya-karya mereka dengan efektif. Metode pengumpulan data pada kegiatan ini yaitu menggunakan kuesioner. ini menunjukkan bahwa pelatihan portofolio menggunakan website sangat mudah dipahami oleh siswa. Selain itu, seluruh siswa berharap pelatihan seperti sering diadakan untuk membantu dalam memanfaatkan teknologi informasi untuk pengembangan diri. Penerapan pelatihan ini di SMK Informatika Wonosobo memberikan manfaat yang signifikan bagi siswa dalam menghadapi tantangan di era digital.   Kata Kunci: Google sites, pelatihan, portofolio, website
Implementasi K-Means Clustering pada Pengelompokan Pasien Penyakit Jantung Wala, Jihan; Herman, Herman; Umar, Rusydi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 9 No. 3 (2024): September 2024
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2024.9.3.205-216

Abstract

Heart disease is a prominent global health concern, necessitating early identification and patient grouping for effective management. This study employs the K-Means clustering algorithm with a medical dataset of 303 patients, encompassing various attributes. These include Age, Gender, Chest Pain Type, Blood Pressure, Serum Cholesterol Level, Fasting Blood Sugar, Resting Electrocardiographic Results, Maximum Heart Rate, Angina, ST Depression, and Slope of the ST Segment. The goal is to categorize patients into four clusters based on chest pain types, a crucial symptom indicating disease severity. The computation concludes after the sixth iteration, revealing Cluster 1 (27 patients), Cluster 2 (135 patients), Cluster 3 (15 patients), and Cluster 4 (126 patients). Collaborative analysis with medical experts highlights that Cluster 1, mainly comprising older males, exhibits high-risk indicators. While this grouping aids in personalized treatment strategy development, further clinical validation involving more experts and datasets is imperative for enhanced reliability.
Prediksi Kelulusan Tepat Waktu Berdasarkan Riwayat Akademik Menggunakan Metode K-Nearest Neighbor Riadi, Imam; Umar, Rusydi; Anggara, Rio
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 11 No 2: April 2024
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.20241127330

Abstract

Lulus tepat waktu adalah pencapaian paripurna ingin dicapai oleh semua mahasiswa atau calon mahasiswa. Kelulusan memiliki 2 klasifikasi seperti lulus tidak tepat waktu dan lulus tepat waktu. Kelulusan menjadi suatu penilaian akreditasi universitas dan penilaian oleh masyarakat secara luas. Perguruan tinggi meluluskan mahasiswa-mahasiwa dengan beberapa kriteria standar yang harus dimiliki. Diharapkan mahasiswa lulus memenuhi syarat standar kelulusan dalam waktu maksimal 4 tahun masa studi. Evaluasi dan pemantauan kelulusan sangat penting dilakukan, salah satunya dengan mempelajari data history mahasiswa yang telah lulus sebagai upaya mahasiswa lulus tidak melebihi waktu standar yang telah ditetapkan. Prediksi kelulusan yang dilakukan pada riset menggunakan kaidah klasifikasi K-Nearest Neighbor dengan objek penelitian yaitu mahasiswa. Atribut yang dipakai dalam penelitian metode klasifikasi yaitu nama, asal SMA/SMK, wilayah asal SMA/SMK, nilai rata-rata matematika dan lama studi. Tahapan penelitian diawali dengan pengumpulan data, pemilihan atribut, pembersihan data, transformasi data, pemilihan data testing dan data training. Pengujian akurasi yang didapatkan pada penelitian metode klasifikasi dengan klaster data k=1, k=2, k=3, k=4, k=5, k=6 dan k=7 menghasilkan klaster dengan nilai k=3 paling tinggi. Hasil pengujian akurasi prediksi penelitian menggunakan confusion matrix menghasilkan akurasi paling besar sesuai target yaitu mencapai 78% menggunakan objek penelitian sebanyak 93 data mahasiswa terdiri dari 78 training dan 12 data testing. Hasil pengujian point k=1 sampai point k=7, k=3 merupakan nilai akurasi prediksi yang paling tinggi sehingga hasil penelitian menjadi sumber pengetahuan untuk fakultas dalam prediksi kelulusan mahasiswa.AbstractGraduating on time is a plenary achievement to be achieved by all students or prospective students. Graduation has 2 classifications such as graduating not on time and graduating on time. Graduation becomes an assessment of university accreditation and an assessment by the wider community. Universities graduate students with several standard criteria that must be possessed. It is expected that graduating students meet the graduation standard requirements within a maximum of 4 years of study period. Evaluation and monitoring of graduation is very important to do, one of which is by studying the history data of students who have graduated as an effort for students to graduate not to exceed the standard time that has been set. The graduation predictions carried out in research use the K-Nearest Neighbor classification rules with the research object being students. The attributes used in the research classification method are name, high school/vocational high school origin, high school/vocational high school origin, average grade in mathematics and length of study. The research phase begins with data collection, attribute selection, data cleaning, data transformation, selection of testing data and training data. The accuracy test obtained in the classification method research with data clusters k = 1, k = 2, k = 3, k = 4, k = 5, k = 6 and k = 7 produces a cluster with the highest k = 3 value. The results of testing the accuracy of research predictions using the confusion matrix produced the greatest accuracy according to the target, reaching 78% using a research object of 93 student data consisting of 78 training and 12 testing data. The test results point k=1 to point k=7, k=3 is the highest prediction accuracy value so that the research results become a source of knowledge for the faculty in predicting student graduation.
Implementasi Deployment Layanan Website Menggunakan Kubernetes Dengan Ci/Cd Jenkins: Implementasi Deployment Layanan Website Menggunakan Kubernetes Dengan Ci/Cd Jenkins Maulana, Irvan; Umar, Rusydi; Yudhana, Anton
Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) Vol 23 No 2 (2024): Agustus 2024
Publisher : PRPM STMIK TRIGUNA DHARMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53513/jis.v23i2.9992

Abstract

pemetintahan, perdagangan , dan lain-lain. Website adalah kumpulan halaman dalam suatu domain yang memuat tentang berbagai informasi agar dapat dibaca dan dilihat oleh pengguna internet melalui sebuah mesin pencari[13]. Informasi yang dapat dimuat dalam sebuah website umumnya berisi mengenai konten gambar, ilustrasi, video, dan teks untuk berbagai macam kepentingan. Website menjadi salah satu alat penyampai informasi paling popiler sat ini, mulai dari pemerintahan, media, berita, perusahaan maupun personal. Sehingga dibutuhkan website yang dapat terus berkembang dan pemeliharaan yang lebih sederhana. Penelitian ini berfokus pada pembangunan infrastruktur Continous Integration/Continous Delivery/Deployment (CI/CD) dengan manajemen cluster menggunakan kubernetes. Metode deployment aplikasi menggunakan CI/CD lebih efisien untuk perkembangan aplikasi yang berjalan terus menerus. Sedangkan kubernetes sangat membantu perkembangan aplikasi yang berbasis container dan microservices[1]. Selain itu, kubernetes juga memiliki beberapa kelebihan antara lain: auto-scaling dan load balancing. Penelitian ini menghasilkan sebuah produk infrastruktur CI/CD yang membuat proses deployment dan pengembangan aplikasi web dapat berjalan secara cepat, efisien dan efektif.
APPLICATION OF OWASP ZAP FRAMEWORK FOR SECURITY ANALYSIS OF LMS USING PENTEST METHOD Rusydi Umar; Imam Riadi; Sonny Abriantoro Wicaksono
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol. 10 No. 2 (2024): JITK Issue November 2024
Publisher : LPPM Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/jitk.v10i2.5534

Abstract

Learning Management System (LMS) is an application currently popular for online learning. The presence of LMS offers better prospects for the world of education, where its highly efficient use allows learning anywhere and anytime through the internet or other computer media. This study focuses on analyzing the security of the Learning Management System (LMS) on the domain e-learning.ibm.ac.id using the Pentest method with the Owasp Zap Framework. Security is a crucial step that needs to be considered by IBM Bekasi in protecting data and information from hacker threats. In this study, the method used is Pentest. Pentest is a series of methods used to test the security of a system by conducting literature studies, searching for data information, and domain information, followed by testing using Owasp Zap to find security-related vulnerabilities. The results of the testing using the Pentest method involve several stages of testing and scanning. The first step is checking domain information using Whois Lookup tools and then scanning using ZenMap on e-learning.ibm.ac.id. In this domain information search, the domain status serverTransferProhibited and clientTransferProhibited was found. The next stage is Vulnerability Analysis, where scanning is performed on the domain e-learning.ibm.ac.id using Owasp Zap tools. Based on the results from Owasp Zap scan, 16 vulnerabilities were found, with the breakdown being 2 high risk, 3 medium risk, 6 low risk, and 5 informational. In the exploitation stage using SQLMap, errors were found in the tested parameters, preventing injection.
Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra H, Hermansa; Umar, Rusydi; Yudhana, Anton
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1145.597 KB) | DOI: 10.30645/j-sakti.v4i1.195

Abstract

Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.
Analisis Metode Forward Chaining Pada Sistem Pakar Diagnosa Penyakit Hewan Sapi Berbasis Android Putra, Fajar R. B; Fadlil, Abdul; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.398

Abstract

In particular, Sorong Regency, West Papua, where the availability of veterinarians is still relatively low. The problems that occur in the regency make it difficult for experts to deal with a disease that occurs in livestock, especially cattle. This also makes it difficult for people to diagnose certain diseases experienced by their livestock, so that handling becomes slow and resulting in the risk of death for livestock. This research aims to create an application system to diagnose cattle disease base on android to make it easier for breeders to diagnose symptoms of a disease that occurs in their cattle (cow). The process carried out is by interviewing experts consisting of three paramedics, the results obtained are in the form of disease data, symptoms, and solutions which are used as data on the system. The data that has been analyzed using the Forward Chaining method results in an android-based expert system, help breeders’ difficulties in diagnosing cattle diseases. The results obtained are that the system created to produce a disease that is in accordance with the exiting symptoms. The system is very helpful for farmers in Sorong Regency, they hope that ini the future the system can be updated if there are new diseases or symptoms. The data provided by animal husbandry department and experts are very helpful in this research.`
Sistem Manajemen Percetakan pada CV. Sumber Bahagia Kreasindo Jakarta dengan Metode Prototyping Umar, Rusydi; P, Purwono; Hafidz, Muhammad Nasir; Hanif, Kharis Hudaibiy; Sakti, Fijaya Bima Dwi; Faroek, Dewi Astria
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1150.715 KB) | DOI: 10.30645/j-sakti.v4i1.191

Abstract

Companies that have two or three more people with an agreement between them is the understanding of the Vennootschap Commanditaire (CV). There are various kinds of CVs that are developing at this time, namely agricultural companies, industry, trade, extractives, and service companies. CV. Sumber Bahagia Kreasindo is a company that offers printing services located in Central Jakarta. Increasingly, customers in the company are increasing and expanding, so they need a system that can recapitulate order data from customers to be more efficient and systematic. The rapid development of technology today, so that it can help employees who previously wrote orders manually. Can write orders through the website. The system makes it easy for employees to see the order process from customers,
Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST) Syahib, Muhammad Irwan; Riadi, Imam; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1078.548 KB) | DOI: 10.30645/j-sakti.v4i1.196

Abstract

The rapid development of mobile technology today is directly proportional to the development of mobile applications in it. Making it easier for people to choose and use the application as they want. This has resulted in misuse of negative things, ranging from human trafficking, drug trafficking, as well as online prostitution business. Viber is an Instant Messenger application that makes it easy for users. This application can be used to send messages, call, send photos, audio and video to others. This application has been used by 260 million people worldwide. This is the basis of research to acquire digital evidence in Viber applications. Data obtained after acquiring based on the work steps of NIST are the accounts of the perpetrators, contacts targeted by the perpetrators, call history, text messages, picture messages and videos.
Sistem Informasi Laboratorium Klinik Berbasis Client Server Umar, Rusydi; Siswanto, Anwar; Abe, Tuska; Lestari, Tri; Dzakwan, M Sabiq; N, Musri Iskandar
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.215

Abstract

The copyright of recognition for software programmer is needed to improve their productivity. Linux is the right choice of software to use in their fieldwork. The information system is important to help a good service in a laboratory has taken quality competition—the development of technology base on client-servers supporting an expert application maker to get customer satisfaction. The Laboratory information system has developed using gambas 1.014, the databases using MySQL server five, and Linux operating system.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Annafii, Moch. Nasheh Anton Yudhana Anton Yudhana Anwarudin, Aang Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arizona Firdonsyah Asruddin, Asruddin Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Juliansyah, Fitrah Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kusuma, Ridho Surya Kuswandani, Deni Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Murinto Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nagala Wangsa kencana Nasrulloh, Imam Mahfudl Nugroho, Ismail Adji Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Raden Mohamad Herdian Bhakti Ramdhani, Rezki Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Sidiq, Ahmad Fajar Siswanto, Anwar Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Suwanti Suwanti Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Widya Cholid Wahyudin Winoto, Sakti Yuminah yuminah Yuminah, Yuminah yuminah, Yuminah